Skip to content

IP protocols and ports

The following table shows the required network settings of Industrial Edge. Customers need to apply ingress and egress rules in their firewalls to ensure the required connectivity between all Industrial Edge components:

Port Protocol Direction IEM Offering Usage
443 HTTPS Ingress IEM OS, IEM Pro, IEM Virtual, IEM Cloud Industrial Edge Hub UI
2020 SSH Egress IEM OS Remote support channel for the IEM

Port Protocol Direction IEM Offering Usage
123, UDP NTP Egress IEM OS, IEM Pro, IEM Virtual, IEM Cloud Network time synchronization
123, UDP NTP Ingress Only relevant for IEM OS or IEMV if used as an NTP server. Optional feature Network time synchronization, acting as server in IEM OS.
53, UDP DNS Egress IEM OS, IEM Pro, IEM Virtual, IEM Cloud Domain name resolution
80 HTTP Ingress IEM Virtual Redirection to port 4443
443 HTTPS Ingress IEM OS, IEM Pro, IEM Virtual, IEM Cloud IE Management UI
4443 HTTPS Ingress IEM Virtual Initial setup UI. Service & Maintenance UI
9443, 9444 HTTPS Ingress IEM OS IE Management UI
2020 SSH Egress IEM OS Remote support channel for IEM OS.
9100, TCP HTTP Egress IEM Virtual Performance metrics for IEM Virtual (only when enabled)

Port Protocol Direction IEM Offering Usage
443 HTTPS Egress IEM OS, IEM Pro, IEM Virtual, IEM Cloud IE Management UI
123, UDP NTP Egress IEM OS, IEM Pro, IEM Virtual, IEM Cloud Network time synchronization
443 HTTPS Ingress IEM OS, IEM Pro, IEM Virtual, IEM Cloud Edge Device UI
9443, 9444 HTTPS Egress IEM OS IE Management UI (with IEM self-signed certificates)
32500 SSH Egress IEM OS Remote access for Edge Devices, port can differ depending on the device builder.
50051 gRPC Egress All Enabling dynamic service discovery, integration, and management across distributed applications
53 DNS Egress All DNS (Domain Name System) is crucial when Industrial Edge Devices need to resolve domain names into IP addresses. This functionality is especially important for accessing services such as the Industrial Edge Management Cloud.

Port Protocol Direction IEM Offering Usage
443 HTTPS Egress IEM OS, IEM Pro, IEM Virtual, IEM Cloud IE Management UI
9443 HTTPS Egress IEM OS IE Management UI

Port Protocol Direction IEM Offering Usage
32500 SSH Ingress IEM OS Remote access for Edge Devices

The following figure shows data traffic and the involved ports as an example:

traffic and ports

Customer-reachable UIs

For the IEM, IP-based or DNS-based operation is determined during the setup and cannot be changed afterwards. With an IP-based setup, the self-generated certificates from the IEM are always used. With a DNS-based setup, user-generated certificates are possible and mandatory. IEDs are always being onboarded using self-generated certificates from the IEM. These certificates can be exchanged with user-generated certificates. The IEM certificates cannot be restored.

IE component IP-based setup DNS-based setup IEM Offering Remark
IEM https://<IP>/ https://<IEM-name>/ IEM OS, IEM Virtual -
IEM-Registry https://<IP>/v2/ https://<IEM-registry>/v2/ IEM OS Must be accessible for all connected IEDs
IED https://<IP>:443 https://<IED-name>:443 - If DNS is used, name must be included in certificate

For older VM based IEM setup you can refer these URLs.

IE component IP-based setup DNS-based setup IEM Offering Remark
IEM OS https://<IP>:443 - IEM OS DNS not possible
IEMA https://<IP>:9443 https://<IEM-name>:443 IEM OS -
IEM-Registry (For ISO based IEM) https://<IP>:9444 https://<IEM-registry>:443 IEM OS Must be accessible for all connected IEDs
IED https://<IP>:443 https://<IED-name>:443 - If DNS is used, name must be included in certificate